Analysis
-
max time kernel
154s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:38
Static task
static1
Behavioral task
behavioral1
Sample
24c44bf4cbbd06c672dffd9b6f78171a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24c44bf4cbbd06c672dffd9b6f78171a.exe
Resource
win10v2004-20231215-en
General
-
Target
24c44bf4cbbd06c672dffd9b6f78171a.exe
-
Size
907KB
-
MD5
24c44bf4cbbd06c672dffd9b6f78171a
-
SHA1
fc826e1ec95463fd2773fc58de5c18f8e023696b
-
SHA256
1a9a4cf46a37070dd3ad3dee4dd09059a770003273cbbb6ff9d3df6baebfdb8a
-
SHA512
4e0c2de184914bab6344daf17cb78f4684d8465b60a2e92ebb2bed865753b186a6e4af43916070e0db9d671a8d6c97cca829ec0aa0ab60dfb2d43408997e843b
-
SSDEEP
24576:BMlNqKkGaRVkfxbxIIYsQuxARGxzEi4Lrh+R1j44rlyxOQiFYN2OTCvYsZ+cQlfc:x5HY+hXr/UIsrG0gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1228 24c44bf4cbbd06c672dffd9b6f78171a.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 24c44bf4cbbd06c672dffd9b6f78171a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3800 24c44bf4cbbd06c672dffd9b6f78171a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3800 24c44bf4cbbd06c672dffd9b6f78171a.exe 1228 24c44bf4cbbd06c672dffd9b6f78171a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 1228 3800 24c44bf4cbbd06c672dffd9b6f78171a.exe 93 PID 3800 wrote to memory of 1228 3800 24c44bf4cbbd06c672dffd9b6f78171a.exe 93 PID 3800 wrote to memory of 1228 3800 24c44bf4cbbd06c672dffd9b6f78171a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c44bf4cbbd06c672dffd9b6f78171a.exe"C:\Users\Admin\AppData\Local\Temp\24c44bf4cbbd06c672dffd9b6f78171a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\24c44bf4cbbd06c672dffd9b6f78171a.exeC:\Users\Admin\AppData\Local\Temp\24c44bf4cbbd06c672dffd9b6f78171a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD58bab3a67886b7515f851c1e49684130d
SHA115bc322063177b0ebae2eab4b6e7182c6a9eae28
SHA256d8ed113e4dd932561776fcc8327215d07de3189b478425505f136ea732a2a738
SHA51246a540f139c8d8221ee29af0a3e64aa33f7affaf522821680ff735f5ab306f0b17903f64849cd0effff19bf32067e9494237ad8beacbf43b2670c6b240ec59b8